Design and Implementation of Secure Communication using Elliptic Curve Cryptograph between Wireless Sensor Nodes
Gagana B E1, S Usha2, Rajesh K S3
1Gagana B E*, PG Student Dept of CSE, Rajarajeswari College of Engineering Bangalore, India.
2S Usha, Professor and Head, Dept of CSE, Rajarajeswari College of Engineering Bangalore, India.
3Rajesh K S, Associate Professor, Dept of CSE, Rajarajeswari College of Engineering Bangalore, India,
Manuscript received on October 12, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 920-935 | Volume-9 Issue-1, November 2019. | Retrieval Number: I7508078919/2019©BEIESP | DOI: 10.35940/ijitee.I7508.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Wireless Sensor Networks is an emerging trend and has become gradually popular across wide range. A key distributional protocol is intended to safely provide authentic motes with secret keys system using Elliptic Curve Cryptography functions. The convention is a variation of the Diffie_Hellman convention utilizing Elliptic Curve Cryptography. It’s agreement of a key convention that permits pair of gatherings, both having a elliptic open and closed key, to build up a mutual secret key over an uncertain channel. This shared secret key may be either utilized as key or used to determine another key which would then be able to be utilized to subsequent correspondences utilizing a cipher of symmetric key. The use of advanced encryption standard for the encrypt and decrypt of the data also ensures that security is never flawed. Therefore Elliptic curve cryptograph is a best candidate for providing secure communication between Wireless Sensor Networks.
Keywords: Advance Encrypt Algorithm (AES), Cipher Text key, Diffie_Hellman Convention, Elliptic Curve Cryptographic (ECC), Wireless or Remote Sensor Network (WSN).
Scope of the Article: Wireless Access Technologies for IoT